summaryrefslogtreecommitdiff
path: root/test/nagios/webapp_login.py
diff options
context:
space:
mode:
authorAzul <azul@leap.se>2014-04-15 17:17:36 +0200
committerAzul <azul@leap.se>2014-04-17 10:39:59 +0200
commitbe2971c2e615cc8a808822317d049e99f5183bdc (patch)
treeee2e77b91f661f5fa6c69f5d851eb848f38eb3b6 /test/nagios/webapp_login.py
parent44d2d031555c889b94e9738cb45740b16a4071ce (diff)
refactor: move nagios specifs to nagios_test
nagios_test.run takes a function and executes it. If it returns nothing or 0 and OK nagios message is printed. If it returns sth. else this will be printed a a warning If it raises an exception that will result in a CRITICAL report. This way we can keep the nagios things outside the test cases and just write simple functions that either return 0, a warnign or raise a meaningful exception
Diffstat (limited to 'test/nagios/webapp_login.py')
-rwxr-xr-xtest/nagios/webapp_login.py28
1 files changed, 12 insertions, 16 deletions
diff --git a/test/nagios/webapp_login.py b/test/nagios/webapp_login.py
index a7e3473..6d06438 100755
--- a/test/nagios/webapp_login.py
+++ b/test/nagios/webapp_login.py
@@ -9,40 +9,34 @@ import random
import srp._pysrp as srp
import binascii
import yaml
-import report
safe_unhexlify = lambda x: binascii.unhexlify(x) if (
len(x) % 2 == 0) else binascii.unhexlify('0' + x)
-report.system = 'webapp login'
-
def read_config():
with open("/etc/leap/hiera.yaml", 'r') as stream:
config = yaml.load(stream)
user = config['webapp']['nagios_test_user']
if 'username' not in user:
- report.fail('nagios test user lacks username')
+ raise Exception('nagios test user lacks username')
if 'password' not in user:
- report.fail('nagios test user lacks password')
+ raise Exception('nagios test user lacks password')
api = config['api']
api['version'] = config['webapp']['api_version']
return {'api': api, 'user': user}
-def run_tests(config):
+def login_successfully(config=None):
+ config = config or read_config()
user = config['user']
api = config['api']
usr = srp.User(user['username'], user['password'], srp.SHA256, srp.NG_1024)
- try:
- auth = authenticate(api, usr)
- except requests.exceptions.ConnectionError:
- report.fail('no connection to server')
+ auth = authenticate(api, usr)
if ('errors' in auth):
- report.fail('srp password auth failed')
+ raise Exception('srp password auth failed')
usr.verify_session(safe_unhexlify(auth["M2"]))
- if usr.authenticated():
- report.ok('can login to webapp fine')
- report.warn('failed to verify webapp server')
+ if not usr.authenticated():
+ return 'failed to verify webapp server'
def authenticate(api, usr):
api_url = "https://{domain}:{port}/{version}".format(**api)
@@ -55,7 +49,7 @@ def authenticate(api, usr):
response = session.post(api_url + '/sessions', data=params, verify=False)
init = response.json()
if ('errors' in init):
- report.fail('test user not found')
+ raise Exception('test user not found')
M = usr.process_challenge(
safe_unhexlify(init['salt']), safe_unhexlify(init['B']))
response = session.put(api_url + '/sessions/' + uname, verify=False,
@@ -63,4 +57,6 @@ def authenticate(api, usr):
return response.json()
if __name__ == '__main__':
- run_tests(read_config())
+ import nagios_test
+ exit_code = nagios_test.run(login_successfully)
+ exit(exit_code)